Micropolis Interdependency Modeling using Open Hybrid Automata

Size: px
Start display at page:

Download "Micropolis Interdependency Modeling using Open Hybrid Automata"

Transcription

1 Micropolis Interdependency Modeling using Open Hybrid Automata Constantinos Heracleous KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus Abstract. Micropolis is a virtual city that is used for various studies, such as modeling and analyzing water networks. In this paper we model the various interdependencies between three major infrastructures in Micropolis, the power system, the communication network and the water network, in order to study cascades effects between them. Specifically, we develop open hybrid automata models for the main components of the three infrastructures and then composed them together based on their interdependencies. Keywords: interdependency modeling, hybrid systems, open hybrid automata 1 Introduction The normal operation of the three Micropolis infrastructure systems, i.e., water, power and communication, heavily depends on the various interdependencies that exist among them. For instance, the water and communication systems receive electricity from the power system to feed the water pumps and the cell antennas, respectively, while the power and water systems rely on the communication system for data transmission for their monitoring and control. If interdependencies break due to failure in one system, there will be a disruption to the normal operation of the other systems as well. Thus, it is important to study interdependencies and develop models to analyze their cascading effects. To facilitate the identification, understanding, and analysis of interdependencies, we usually classify them based on their characteristics into the following four principal types [1]: (a) physical, if the operations of one infrastructure depends on the physical output(s) of the other and vice versa, (b) cyber, if there is information/signal transmission between different infrastructures, (c) geographic, if components of different infrastructures are in close spatial proximity, and (d) logical, due to any other mechanism (e.g., various policy, legal, or regulatory regimes) that can link logically two or more infrastructures. Interdependencies are bidirectional relationships while dependencies are unidirectional relationships. When multiple infrastructures are connected as system of systems and their individual components are considered, interdependencies are the result of multiple dependencies between the components of different infrastructures. These are often called external dependencies and they can be the same type as interdependencies i.e., physical, cyber, geographic, or logical, but just unidirectional. There are also internal dependencies, which are the connections be-

2 tween components inside the same infrastructure, for instance the connection inside the water infrastructure between a pump and a tank is an internal dependency. 2 Micropolis main Components and Interdependencies For the city of Micropolis the main components of the three systems and their internal and external dependencies are shown in Figure. Specifically, the following components are considered: for the power system (1) the substation that supplies power to Micropolis and (2) the SCADA that remotely monitors and controls the substation; for the communication system (3) the network that consists of a number of microcell antennas; and lastly for the water system (4) the tank that supplies water to Micropolis and (5) the pump to which the tank is dependent for water, thus there is an internal dependency between the two. As external dependencies among the components three types are considered: (i) the physical dependencies of the pump and the network on the substation for power supply; (ii) the cyber dependencies of all the components on the network, i.e., the communication links to the substation, the SCADA, the pump and the tank; and (iii) the logical dependencies such as the power and water demands for the substation and the tank, respectively. Although there are geographic interdependencies between all the components, due to the close spatial proximity between them (Micropolis is a small town), we do not consider them in this work since they usually have an effect during intentional attacks or natural disasters (e.g., explosions, floods, and earthquakes) and given the size of Micropolis such events would affect all the components at once without any cascading effects between them. Figure 1 Overview of Micropolis main infrastructures components and their dependencies. 3 Open Hybrid Automata Modeling To model the main components of Micropolis and the dependencies between them in order to study possible cascading effects we use open hybrid automata as proposed in [2] which the reader is encouraged to review for more information. The open hybrid automata are used as models for hybrid systems, i.e., systems with both continuous and discrete behaviors such as critical infrastructures. For instance in a water system the start and stop of a pump is discrete while the flow of water is continuous. With open hybrid automata it is possible to model the behavior of each critical infrastructure component at the necessary

3 level of abstraction, i.e., how the component will behave in case it fails or if there is no power supply or communication available. The dependencies among the components on the other hand, are represented by the connections between the inputs and the outputs of the various open hybrid automata models. Formally, connecting the inputs and the outputs of two or more open hybrid automata is called composition, and the result is another open hybrid automaton bigger and more complex that has the remaining inputs and outputs. The new open hybrid automaton is often referred to as the composition model and consists of all the open hybrid automata running in parallel. The composition model is the one that can be simulated for various scenarios where component(s) set to fail at specific time(s) and observe the cascading effects to the other components. Table 1 Models variables descriptions Substation xx "# Timer (state) pp % Power Measurement (output) ss '( Switch Signal from SCADA (input) PP *+% Power Limit (constant) pp, Power Demand (input) TT. Safety Period (constant) pp. Power Supply (output) εε White Noise (random variable) SCADA xx "0 Timer (state) ss '( Switch Control Signal (output) pp % Substation Power Measur. (input) TT, Transmission Delay Time (constant) ss 12 SCADA Operator Control (input) TT. Safety Time (constant) Network xx "3#0 Timer for UPS reserve (state) φφ 5 Fault Trigger (Input) ss 67[9,;,<] Signals values of Substation, SCADA, and Tank, that pass and delayed through the network (input and output) pp 5, Instant Network Power Demand (output) TT 67[9,;,<] Transmission Delay for each ss 67[9,;,<] (constant) pp 5. Instant Power Supply (input) PP 5 Network Working Power (constant) Tank xx > Water Volume (state) vv "@56 Instant Tank Water Volume (output) ww, Water Demand (input) VV C Initial Tank Water Volume (constant) ww. Water Supply (input) VV %@D Tank Maximum Volume (constant) Pump xx " Timer for Pump Operation (state) VV "E Staring Pump Volume Threshold (constant) vv "@56 Tank Water Volume Measurm. (input) pp F. Instant Power Supply (input) TT GHH Pump Min Resting Period (constant) φφ F Fault Trigger (Input) TT G5 Pump Max Working Period (constant) ww. Water Supply (output) Average Water Supply (constant) pp F, Instant Power Demand (output) PP F Pump Working Power (constant) Tank Maximum Volume (constant) VV %@D In the next subsections the open hybrid automata models for the main components of Micropolis are presented and then the composition model is derived based on the dependencies among them (see Figure ). The open hybrid automata models for the power substation, SCADA, are similar with those presented in [2], with minor modifications mostly to the variables names to make them less generic and more relevant to each infrastructure component. Descriptions for each model variables are summarized in Table 1.

4 3.1 Power Distribution Network (PDN) Components - Substation and SCADA The open hybrid automaton model for the Power Substation is shown in Figure and is the same as the one in [2]. The model consists of two discrete states that represent the behavior of the substation i.e., Supply Power or Switch Off. When in Supply Power state the output pp. = pp, (power supply to Micropolis equals to the power demand) and when in the Switch Off state the output pp. = 0, also pp %, that denotes the power measurements, changes accordingly. The transitions between the two discrete are represented by the guards. For instance, the transition from the Supply Power to the Switch Off state will occur either if its requested remotely from the SCADA (ss '( = 1) or due to safety reasons when the power demand is larger than the limit of the substation (pp, PP *+% ). More detailed explanation for the model can be found in [2]. Figure 2 Power substation open hybrid automaton model. The open hybrid automaton model for the SCADA is shown in Figure. The model is also the same as the one in [2] and represents the SCADA behavior according to the power measurements input (pp % ) and the operator input (ss 12 ). The SCADA model will be at the Closed state if the substation is in the Supply Power state, representing the state of the switches at the substation, or at the Open state if the substation is in the Switch Off state or the operator decides to remotely cut the power for maintenance. In case of fault at the network it will go to the Conn. Down state. The discrete transitions are determined by the two inputs (pp %, ss 12 ) and also by the continuous state xx "0 that acts as a timer while in the Close and Open states. Figure 3 Power SCADA open hybrid automaton model.

5 3.2 Communication Network (CN) Component The open hybrid automaton model for the Network is shown in Figure. The model is an extension of the work [2] with the addition of an extra signal input (ss < ) that represents the communication between the water tank and the pump. The model consists of three discrete states that denote the behavior of the network. In the Healthy state the network operates normally providing communication services to Micropolis. In case of a power cut, where the power is not enough to feed the antennas (pp 5. < PP 5 ) they will switch to UPS, thus the model transitions to the UPS usage state. However, the UPS can last for only a certain amount of time and this is what the continuous state xx "3#0 is counting. Once it reaches the limit (xx "3#0 TT PF. ) the network will stop operating and this is represented in the model by transitioning to the Net Down state. Transition to the Net Down state is also triggered in case of a technical fault in the network which is denoted with the input φφ 5. More detailed explanation for the model can be found in [2]. Figure 4 Network open hybrid automaton model 3.3 Water Distribution Network (WDN) Components - Tank and Pump The tank receives and stores water from the pump and supplies Micropolis based on the demand. This has to be controlled accordingly since too much water from the pump can overflow the tank while less water can drain it. The tank open hybrid automaton model is shown in Figure. The continuous state xx > denotes the volume of the tank that changes according to xx > = ww. ww,, where ww. denotes the water supply rate from the pump, and ww, the water demand rate of consumers. The discrete states of the model are determined by the tank volume. For instance, the model will be at the Healthy state while 0 < xx > VV %@D, where VV %@D is the tank's maximum volume, and it will transition to either the Drained state if xx > 0 or to the Overflow state if xx > > VV %@D. The model will return back to the Healthy state if the water supply becomes larger than the demand ww. > ww, and is in the Drained state, or if the water demand becomes larger than the supply ww, > ww. and is in the Overflow state. The single output of the model vv "@56 denotes the tank's volume measurement depending on the state, and is transmitted to the pump through the network so that the pump can start and stop as described next.

6 Figure 5 Tank open hybrid automaton model. The pump supplies Micropolis tank with water by receiving and comparing the tank volume measurement with some threshold, if the tank volume goes below the threshold value then the pump will start given that the substation provides the necessary power. There are also restrictions to the pump operation such as maximum working period and minimum resting period. The pump open hybrid automaton model is shown in Figure. The model has three discrete states: (i) the Pump Off when the pump is off, (ii) the Pump On when the pump is on and supplies the tank with water, and (iii) the Fault state when there is power cut, network issues, or technical fault that prevent the pump to operate normally. The discrete transitions between the Pump Off and Pump On states are trigger by the input vv "@56, that denotes the tank's volume measurement, and by the continuous state xx ", that acts as a timer counting the working and the resting period of the pump. Specifically, the transition from Pump Off to Pump On is triggered when the tank s volume goes below the specified threshold VV "E and also the pump s resting period TT GHH has expired, i.e. vv "@56 < VV "E xx " TT GHH. The transition from the Pump On back to Pump Off state is triggered either when the tank's water volume reaches the maximum volume VV %@D or if the maximum working period TT G5 of the pump has been reached, i.e. vv "@56 VV %@D xx " > TT G5. In case of one or more issues such as: less power supply than what is necessary (pp F. < PP F ), network issues (vv "@56 = 1), or the pump suffers a technical fault (φφ F = 1), the model will transition to the Fault state. Once the issue(s) is/are resolved it will transition to the Pump Off state and it will be ready to supply water to the tank accordingly. The two outputs of the model, ww. that denotes the water supply by the pump and pp F, that denotes the power demand of the pump, change values based on the discrete state of the model. In both Pump Off and Fault states ww. = 0 and pp F, = 0, while in the Pump On ww. = and pp F, = PP F, where is the average water supply rate of the pump and PP F the necessary pump power. Figure 6 Pump open hybrid automaton model.

7 3.4 Composition Model The five open hybrid automata models are composed together as shown in Figure creating the composition model, a larger model that includes the various dependencies between the components. As elaborated above, there are physical, cyber and logical external dependencies between the components and internal dependency between the tank and the pump, that are all depicted in detail in Figure. In the composition the component models run in parallel with the output of one model to become the input to the other, developing various feedback loops between them, which represent infrastructure interdependencies. For example, both the power substation and the SCADA use the network to transmit power measurements and control signals between them, as depicted in Figure with the necessary connections. The network is also depended on the substation model for power. These dependency connections create feedback loops between these three models, which subsequently form an interdependency between the power and the communication infrastructure. This allows the study of cascading effects between the various components by running simulation scenarios with the composition model as presented in the next section. Figure 7 Composition model 4 Conclusions In this work we have develop open hybrid automata models of the main critical infrastructures for Micropolis virtual city, that can be used to study cascading faults. Specifically, the composition model, through several simulation scenarios, can determine under what conditions a fault in one component can cascade to other components in other infrastructures due to the effects of interdependencies. References [1] S. Rinaldi, J. Peerenboom, and T. Kelly, Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Control Syst. Mag., vol. 21, no. 6, pp , [2] C. Heracleous, C. G. Panayiotou, M. M. Polycarpou, and G. Ellinas, "Modeling interdependent critical infrastructures using open hybrid automata," 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2015, pp

Multi-Sector Urban System Initiatives

Multi-Sector Urban System Initiatives Multi-Sector Urban System Initiatives Colin Harrison IBM Distinguished Engineer Emeritus colinh@us.ibm.com Regional Approaches to Urban Sustainability A National Academies Workshop Portland, OR May 28-29,

More information

Chanan Singh Texas A&M University PSERC Webinar November 22, 2016

Chanan Singh Texas A&M University PSERC Webinar November 22, 2016 Chanan Singh Texas A&M University (singh@ece.tamu.edu) PSERC Webinar November 22, 2016 1 Modern power systems: integration of current carrying components (for power delivery), monitoring, computing, communication

More information

Securing Europe s IoT Devices and Services

Securing Europe s IoT Devices and Services Securing Europe s IoT Devices and Services Dr. Evangelos OUZOUNIS Head of Unit - Secure Infrastructure and Services Validation Workshop Berlin 16 October 2015 European Union Agency for Network and Information

More information

CI-3 Dependency and Interdependency Considerations for Critical Infrastructure

CI-3 Dependency and Interdependency Considerations for Critical Infrastructure CI-3 Dependency and Interdependency Considerations for Critical Infrastructure Prepared for: GovSec West 2011 Critical Infrastructure and Key Assets Protection & Response November 15, 2011 Lori Eaton Infrastructure

More information

A Process Model suitable for defining and programming MpSoCs

A Process Model suitable for defining and programming MpSoCs A Process Model suitable for defining and programming MpSoCs MpSoC-Workshop at Rheinfels, 29-30.6.2010 F. Mayer-Lindenberg, TU Hamburg-Harburg 1. Motivation 2. The Process Model 3. Mapping to MpSoC 4.

More information

A Multi-Modal Composability Framework for Cyber-Physical Systems

A Multi-Modal Composability Framework for Cyber-Physical Systems S5 Symposium June 12, 2012 A Multi-Modal Composability Framework for Cyber-Physical Systems Linh Thi Xuan Phan Insup Lee PRECISE Center University of Pennsylvania Avionics, Automotive Medical Devices Cyber-physical

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

Using Hybrid-System Verification Tools in the Design of Simplex-Based Systems. Scott D. Stoller

Using Hybrid-System Verification Tools in the Design of Simplex-Based Systems. Scott D. Stoller Using Hybrid-System Verification Tools in the Design of Simplex-Based Systems Scott D. Stoller 2014 Annual Safe and Secure Systems and Software Symposium (S5) 1 Simplex Architecture Simplex Architecture

More information

Modal Models in Ptolemy

Modal Models in Ptolemy Modal Models in Ptolemy Edward A. Lee Stavros Tripakis UC Berkeley Workshop on Equation-Based Object-Oriented Modeling Languages and Tools 3rd International Workshop on Equation-Based Object-Oriented Modeling

More information

Accord Builder. User Guide

Accord Builder. User Guide User Guide Document: V 3.6 User Guide R01 V3.6 User Guide R01 Page 1 of 110 Table of Contents 1 Introduction... 7 2 General Summary and Definitions... 8 2.1 Accord Platform and Plant... 8 2.2 PLC Control

More information

Loop Automation. Technical Manual for the ADVC Controller Range

Loop Automation. Technical Manual for the ADVC Controller Range Loop Automation Technical Manual for the ADVC Controller Range Contents List of Figures 5 List of Tables 7 Acronyms 7 Symbols 7 Introduction 8 About this Manual 8 ADVC Controller Firmware Version 9 WSOS

More information

Cyber Security Reliability Standards CIP V5 Transition Guidance:

Cyber Security Reliability Standards CIP V5 Transition Guidance: Cyber Security Reliability Standards CIP V5 Transition Guidance: ERO Compliance and Enforcement Activities during the Transition to the CIP Version 5 Reliability Standards To: Regional Entities and Responsible

More information

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation International Journal of Materials & Structural Reliability Vol.4, No.1, March 2006, 65-77 International Journal of Materials & Structural Reliability Stochastic Petri Nets Supporting Dynamic Reliability

More information

Reliability Models for Electric Power Systems

Reliability Models for Electric Power Systems Reliability Models for Electric Power Systems White Paper 23 Revision 1 by Neil Rasmussen > Executive summary This white paper explains the sources of downtime in electric power systems and provides an

More information

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 + Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association of State

More information

The Challenges of Risk Assessment for Smart Grid

The Challenges of Risk Assessment for Smart Grid The Challenges of Risk Assessment for Smart Grid Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September, 2014 Risk Assessment:

More information

VIKING. Vital Infrastructure, Networks, Information and Control Systems Management. A Research Project in the EU Seventh Framework Programme

VIKING. Vital Infrastructure, Networks, Information and Control Systems Management. A Research Project in the EU Seventh Framework Programme VIKING Vital Infrastructure, Networks, Information and Control Systems Management A Research Project in the EU Seventh Framework Programme Mathias Ekstedt, PhD Industrial Information and Control Systems

More information

Santa Clara County. San Francisco City and County. Marin County. Napa County. Solano County. Contra Costa County. San Mateo County

Santa Clara County. San Francisco City and County. Marin County. Napa County. Solano County. Contra Costa County. San Mateo County Marin County Santa Clara County San Francisco City and County Sonoma County Napa County Contra Costa County San Mateo County Solano County Alameda County ABAG History In 1961, Bay Area leaders recognized

More information

Long-Term Power Outage Response and Recovery Tabletop Exercise

Long-Term Power Outage Response and Recovery Tabletop Exercise 1 Long-Term Power Outage Response and Recovery Tabletop Exercise After Action Report [Template] The After-Action Report/Improvement Plan (AAR/IP) aligns exercise objectives with preparedness doctrine to

More information

PLC 23 DUAL MEDIA FILTERS 5 AND 6 SCADA SYSTEM OPERATION MANUAL. Revision 1.0 April 18, 2006

PLC 23 DUAL MEDIA FILTERS 5 AND 6 SCADA SYSTEM OPERATION MANUAL. Revision 1.0 April 18, 2006 PLC 23 DUAL MEDIA FILTERS 5 AND 6 SCADA SYSTEM OPERATION MANUAL Revision 1.0 April 18, 2006 PLC 23 DUAL MEDIA FILTERS 5 AND 6 SCADA SYSTEM OPERATION MANUAL Revision 1.0 April 18, 2006 Table of Contents

More information

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies The Geospatial Dimensions of Critical Infrastructure and Emergency Response White Paper Series No. 1 - Infrastructure Interdependencies Infrastructure Interdependencies 1 November 2008 INTRODUCTION In

More information

CORBA in the Time-Triggered Architecture

CORBA in the Time-Triggered Architecture 1 CORBA in the Time-Triggered Architecture H. Kopetz TU Wien July 2003 Outline 2 Hard Real-Time Computing Event and State Messages The Time Triggered Architecture The Marriage of CORBA with the TTA Conclusion

More information

Smart Grid Vision DRAFT FOR DISCUSSION PURPOSES ONLY

Smart Grid Vision DRAFT FOR DISCUSSION PURPOSES ONLY Smart Grid Vision Vision Statement PG&E s vision for the Smart Grid: Smart Grid will leverage advanced communications and control technology to transform the operation of our electric network, from generation

More information

State Identification In The Hybrid Automata Description Of Dynamical Systems

State Identification In The Hybrid Automata Description Of Dynamical Systems State Identification In The Hybrid Automata Description Of Dynamical Systems ISABELLA KOTINI, GEORGE HASSAPIS Dept. of Electrical and Computer Engineering Aristotle University of Thessaloniki 54006, Thessaloniki

More information

Technologies with the potential to enhance resilience - An overview on the activities of ENISA

Technologies with the potential to enhance resilience - An overview on the activities of ENISA Technologies with the potential to enhance resilience - An overview on the activities of ENISA Demosthenes.Ikonomou@enisa.europa.eu 5 th International Conference on Critical Information Infrastructures

More information

Figure 1. Closed-loop model.

Figure 1. Closed-loop model. Model Transformation between MATLAB Simulink and Function Blocks Chia-han (John) Yang and Valeriy Vyatkin Department of Electrical and Computer Engineering University of Auckland cyan034@ec.auckland.ac.nz,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Lecture 9: Reachability

Lecture 9: Reachability Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set

More information

CS 451 Software Engineering

CS 451 Software Engineering CS 451 Software Engineering Yuanfang Cai Room 104, University Crossings 215.895.0298 yfcai@cs.drexel.edu 1 Elaboration 2 Elaboration: Building the Analysis Model An analysis model provides a description

More information

To illustrate what is intended the following are three write ups by students. Diagonalization

To illustrate what is intended the following are three write ups by students. Diagonalization General guidelines: You may work with other people, as long as you write up your solution in your own words and understand everything you turn in. Make sure to justify your answers they should be clear

More information

By Raymond Grosch Senior System Analyst IntelliSys Inc.

By Raymond Grosch Senior System Analyst IntelliSys Inc. IntelliSys Inc. White Paper 09 W. Washington Chicago, IL 60606 800.7.9977 www.intellisyssoftware.com Keywords: SystemVIEW, process visualization, SCADA (Supervisory Control And Data Acquisition), HMI (Human

More information

CONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. XVI - Control Reconfiguration - Jan Lunze

CONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. XVI - Control Reconfiguration - Jan Lunze CONTROL RECONFIGURATION Jan Lunze The Institute of Automation and Computer Control, Ruhr University Bochum, Germany Keywords: Model-matching, Reconfigurability, Reconfiguration, Recoverability. Contents

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information

The Reliability, Efficiency and Treatment Quality of Centralized versus Decentralized Water Infrastructure 1

The Reliability, Efficiency and Treatment Quality of Centralized versus Decentralized Water Infrastructure 1 The Reliability, Efficiency and Treatment Quality of Centralized versus Decentralized Water Infrastructure 1 Dr Qilin Li, Associate Professor, Civil & Environmental Engineering, Rice University Dr. Leonardo

More information

NUTC R203. Reliability Analysis for the Smart Grid: From Cyber Control and Communication to Physical Manifestations of Failure

NUTC R203. Reliability Analysis for the Smart Grid: From Cyber Control and Communication to Physical Manifestations of Failure Reliability Analysis for the Smart Grid: From Cyber Control and Communication to Physical Manifestations of Failure by Ayman Z. Faza, Sahra Sedigh and Bruce M. McMillin NUTC R203 A National University

More information

Future and Emerging Threats in ICT

Future and Emerging Threats in ICT Future and Emerging Threats in ICT www.ict-forward.eu Edita Djambazova Institute for Parallel Processing Bulgarian Academy of Sciences 1 Description ICT-FORWARD is a Coordination Action that aims at promoting

More information

Editor. Analyser XML. Scheduler. generator. Code Generator Code. Scheduler. Analyser. Simulator. Controller Synthesizer.

Editor. Analyser XML. Scheduler. generator. Code Generator Code. Scheduler. Analyser. Simulator. Controller Synthesizer. TIMES - A Tool for Modelling and Implementation of Embedded Systems Tobias Amnell, Elena Fersman, Leonid Mokrushin, Paul Pettersson, and Wang Yi? Uppsala University, Sweden Abstract. Times is a new modelling,

More information

Creating a Dynamic Serial Edge For Integrated Industrial Networks

Creating a Dynamic Serial Edge For Integrated Industrial Networks Creating a Dynamic Serial Edge For Integrated Industrial Networks Technical Brief GarrettCom, Inc. As industrial networks evolve, is becoming the standard technology for new system interfaces and for new

More information

QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR

QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR Multitel (S.Iassinovski) Multitel Research Center Parc Initialis, rue Pierre et Marie Curie n 2 B-7000 Mons, Belgium iassinovski@multitel.be

More information

Wednesday, September 5, 2018

Wednesday, September 5, 2018 UTC Regions 1 & 2 Combined Meeting The Essex, Vermont s Culinary Resort & Spa September 5-7, 2018 Burlington, VT Premier Sponsors Gold Sponsors Wednesday, September 5, 2018 11:00 AM 5:00 PM Meeting Registration

More information

A general framework for critical infrastructure interdependencies modeling using economic input-output model and network analysis

A general framework for critical infrastructure interdependencies modeling using economic input-output model and network analysis A general framework for critical infrastructure interdependencies modeling using economic input-output model and network analysis Jiwei LIN Institute of Catastrophe Risk Management, Interdisciplinary Graduate

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

TIMES A Tool for Modelling and Implementation of Embedded Systems

TIMES A Tool for Modelling and Implementation of Embedded Systems TIMES A Tool for Modelling and Implementation of Embedded Systems Tobias Amnell, Elena Fersman, Leonid Mokrushin, Paul Pettersson, and Wang Yi Uppsala University, Sweden. {tobiasa,elenaf,leom,paupet,yi}@docs.uu.se.

More information

Proposed Cooperative ICT Projects. Mie Mie Thet Thwin. Rector University of Computer Studies, Yangon, Myanmar

Proposed Cooperative ICT Projects. Mie Mie Thet Thwin. Rector University of Computer Studies, Yangon, Myanmar Proposed Cooperative ICT Projects Mie Mie Thet Thwin Rector University of Computer Studies, Yangon, Myanmar Contents Cyber Security Projects Big Data Analytic Projects Research & Education Network Other

More information

Process Control and Instrumentation Technology Model: PCT-200

Process Control and Instrumentation Technology Model: PCT-200 Process Control and Instrumentation Technology Model: PCT-200 Introduction The PCT-200 Process Control and Instrumentation rig provides a self-contained process control system which is representative of

More information

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung POLYTECHNIC UNIVERSITY Department of Computer and Information Science COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung Abstract: Computer simulation of the dynamics of complex

More information

CHAPTER 3 ASYNCHRONOUS PIPELINE CONTROLLER

CHAPTER 3 ASYNCHRONOUS PIPELINE CONTROLLER 84 CHAPTER 3 ASYNCHRONOUS PIPELINE CONTROLLER 3.1 INTRODUCTION The introduction of several new asynchronous designs which provides high throughput and low latency is the significance of this chapter. The

More information

Cyber Security of Power Grids

Cyber Security of Power Grids Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University

More information

U Commands. udld (configuration mode), page 2 udld (Ethernet), page 4. Cisco Nexus 5600 Series Switches Layer2 Command Reference 1

U Commands. udld (configuration mode), page 2 udld (Ethernet), page 4. Cisco Nexus 5600 Series Switches Layer2 Command Reference 1 udld (configuration mode), page 2 udld (Ethernet), page 4 1 udld (configuration mode) udld (configuration mode) To configure the Unidirectional Link Detection (UDLD) protocol on the switch, use the udld

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection

A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection Saleh Soltan, Gil Zussman Columbia University New York, NY Failures in Power Grids One of the most essential

More information

Software Development. Software Testing: Verification and Validation. Verification and Validation (V&V) Verification. Validation

Software Development. Software Testing: Verification and Validation. Verification and Validation (V&V) Verification. Validation Software Development Software Testing: Verification and Validation Problem domain Customer Specification Problem statement A set of (docs, use cases) Program code Running System 2 Verification and Validation

More information

Appendix M. Lifeline Sector Coordination

Appendix M. Lifeline Sector Coordination Appendix M. Lifeline Sector Coordination Regional Water Supply Resiliency Project Phase 2 Summary Report July 2018 This page intentionally left blank. Regional Water Supply Resiliency Project Phase 2 Summary

More information

DISASTER RISK MANAGEMENT (DRM/DRR) TEAM

DISASTER RISK MANAGEMENT (DRM/DRR) TEAM SPARC LABORATORY DISASTER RISK MANAGEMENT (DRM/DRR) TEAM Summary of Research Directions Presented by Sayanti Mukhopadhyay, PhD Candidate Date: 12/14/2016 Director: Makarand (Mark) Hastak, Ph.D., PE, CCP

More information

Subsystem Hazard Analysis (SSHA)

Subsystem Hazard Analysis (SSHA) Subsystem Hazard Analysis (SSHA) c "!$#%! Examine subsystems to determine how their Normal performance Operational degradation Functional failure Unintended function Inadvertent function (proper function

More information

Discrete Event Simulation and Petri net Modeling for Reliability Analysis

Discrete Event Simulation and Petri net Modeling for Reliability Analysis Discrete Event Simulation and Petri net Modeling for Reliability Analysis * Behrouz Safarinejadian Shiraz University of Technology, safarinejad@sutech.ac.ir Abstract. Analytical methods in reliability

More information

EARTH Ex 2017 Middle Planning Conference

EARTH Ex 2017 Middle Planning Conference EARTH Ex 2017 Middle Planning Conference 20 April 2017 Emergency All-sector Response to Transnational Hazards Exercise 23 August 2017 1 EARTH Ex 2017 MPC Sector Objectives Review EARTH Ex Plan, Concepts

More information

Case Study: Nairobi County BY: Akoth Ruzuna F19/3911/2008. Supervisor: Mr. D. N. Siriba.

Case Study: Nairobi County BY: Akoth Ruzuna F19/3911/2008. Supervisor: Mr. D. N. Siriba. USE OF GIS TO DEPICT POWER INTERRUPTIONS Case Study: Nairobi County BY: Akoth Ruzuna F19/3911/2008 Supervisor: Mr. D. N. Siriba. Background Information Information on scheduled power interruptions is announced

More information

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 CPS-SPC 17 @ Dallas, US Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 DANIELE ANTONIOLI, H. R. GHAEINI, S. ADEPU, M. OCHOA, N. O. TIPPENHAUER Singapore University

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

SysteMoC. Verification and Refinement of Actor-Based Models of Computation

SysteMoC. Verification and Refinement of Actor-Based Models of Computation SysteMoC Verification and Refinement of Actor-Based Models of Computation Joachim Falk, Jens Gladigau, Christian Haubelt, Joachim Keinert, Martin Streubühr, and Jürgen Teich {falk, haubelt}@cs.fau.de Hardware-Software-Co-Design

More information

CS5371 Theory of Computation. Lecture 8: Automata Theory VI (PDA, PDA = CFG)

CS5371 Theory of Computation. Lecture 8: Automata Theory VI (PDA, PDA = CFG) CS5371 Theory of Computation Lecture 8: Automata Theory VI (PDA, PDA = CFG) Objectives Introduce Pushdown Automaton (PDA) Show that PDA = CFG In terms of descriptive power Pushdown Automaton (PDA) Roughly

More information

Future Grid Initiative

Future Grid Initiative Future Grid Initiative Enabling renewable energy resources Vijay Vittal Director, Power Systems Engineering Research Center Professor, Arizona State University Workshop objectives PSERC has embarked on

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Research on a Remote Sensing Image Classification Algorithm Based on Decision Table Dehui Zhang1, a, Yong Yang1, b, Kai Song2, c, Deyu Zhang2, d

Research on a Remote Sensing Image Classification Algorithm Based on Decision Table Dehui Zhang1, a, Yong Yang1, b, Kai Song2, c, Deyu Zhang2, d 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 205) Research on a Remote Sensing Image Classification Algorithm Based on Decision Table Dehui Zhang, a, Yong Yang, b,

More information

Exercise Unit 2: Modeling Paradigms - RT-UML. UML: The Unified Modeling Language. Statecharts. RT-UML in AnyLogic

Exercise Unit 2: Modeling Paradigms - RT-UML. UML: The Unified Modeling Language. Statecharts. RT-UML in AnyLogic Exercise Unit 2: Modeling Paradigms - RT-UML UML: The Unified Modeling Language Statecharts RT-UML in AnyLogic Simulation and Modeling I Modeling with RT-UML 1 RT-UML: UML Unified Modeling Language a mix

More information

PALANTIR CYBERMESH INTRODUCTION

PALANTIR CYBERMESH INTRODUCTION 100 Hamilton Avenue Palo Alto, California 94301 PALANTIR CYBERMESH INTRODUCTION Cyber attacks expose organizations to significant security, regulatory, and reputational risks, including the potential for

More information

Critical Resilient Interdependent Infrastructure Systems and Processes

Critical Resilient Interdependent Infrastructure Systems and Processes TeleNeT Program Critical Resilient Interdependent Infrastructure Systems and Processes David Tipper, Professor Graduate Telecommunications and Networking Program School of Computing and Information University

More information

The Australian Government s Approach to Critical Infrastructure Resilience

The Australian Government s Approach to Critical Infrastructure Resilience The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General

More information

Dynamic Modeling - Finite State Machines

Dynamic Modeling - Finite State Machines Dynamic Modeling - Finite State Machines SWE 321 Fall 2014 Rob Pettit 1 Finite State Machines Finite number of states Only in one state at a time Transition Change of state Caused by event Transition to

More information

Remote Access Server Advertisement (RASADV) Protocol

Remote Access Server Advertisement (RASADV) Protocol [MS-RASA]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Critical Asset Identification Methodology. William E. McEvoy Northeast Utilities

Critical Asset Identification Methodology. William E. McEvoy Northeast Utilities Critical Asset Identification Methodology William E. McEvoy Northeast Utilities Disclaimer This NPCC TFIST workshop provides a forum for the presentation and discussion of member experience in the implementation

More information

Composability Test of BOM based models using Petri Nets

Composability Test of BOM based models using Petri Nets I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology

More information

Improved power supply after Fukushima and OPC in Japanese BWRs

Improved power supply after Fukushima and OPC in Japanese BWRs BWR-club workshop on Robust Power in Uppsala Improved power supply after Fukushima and OPC in Japanese BWRs May 3 rd, 2017 Hitachi-GE Nuclear Energy, Ltd Masashi Sugiyama Hitachi-GE Nuclear Energy, Ltd.

More information

DUKE ENERGY OHIO SMART GRID / GRID MODERNIZATION. Don Schneider GM, Smart Grid Field Deployment May 24, 2012

DUKE ENERGY OHIO SMART GRID / GRID MODERNIZATION. Don Schneider GM, Smart Grid Field Deployment May 24, 2012 DUKE ENERGY OHIO SMART GRID / GRID MODERNIZATION Don Schneider GM, Smart Grid Field Deployment May 24, 2012 FACTS ABOUT DUKE ENERGY 150+ years of service 4 million customers Fortune 500 $50 billion in

More information

Adapting Commit Protocols for Large-Scale and Dynamic Distributed Applications

Adapting Commit Protocols for Large-Scale and Dynamic Distributed Applications Adapting Commit Protocols for Large-Scale and Dynamic Distributed Applications Pawel Jurczyk and Li Xiong Emory University, Atlanta GA 30322, USA {pjurczy,lxiong}@emory.edu Abstract. The continued advances

More information

Quantitative Verification and Synthesis of Systems

Quantitative Verification and Synthesis of Systems Quantitative Verification and Synthesis of Systems Sanjit A. Seshia Assistant Professor EECS, UC Berkeley Software-at-Scale Workshop August 2010 Quantitative Analysis / Verification Does the brake-by-wire

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics DRAFT February 19, 15 BES Security s Working Group Page 1 of 7 Chapter X Security Performance s 1 3 3 3 3 0 Background The State of Reliability 1 report noted that the NERC PAS was collaborating with the

More information

UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT

UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT NETWORK TOPOLOGY Network Topology refers to layout of a network and how different nodes in a network are connected to each other

More information

PLC 4 PRIMARY SEDIMENTATION SYSTEM SCADA SYSTEM OPERATION MANUAL. Revision 1.0 May 15, 2006

PLC 4 PRIMARY SEDIMENTATION SYSTEM SCADA SYSTEM OPERATION MANUAL. Revision 1.0 May 15, 2006 PLC 4 PRIMARY SEDIMENTATION SYSTEM SCADA SYSTEM OPERATION MANUAL Revision 1.0 May 15, 2006 PLC 4 PRIMARY SEDIMENTATION SYSTEM SCADA SYSTEM OPERATION MANUAL Revision 1.0 May 15, 2006 Table of Contents 1

More information

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1 DRAFT Cyber Security Communications between Control Centers Technical Rationale and Justification for Reliability Standard CIP-012-1 March May 2018 NERC Report Title Report Date I Table of Contents Preface...

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Building More Efficient Time Parallel Solvers with Applications to Multiscale Modeling and Gyrokinetics

Building More Efficient Time Parallel Solvers with Applications to Multiscale Modeling and Gyrokinetics Building More Efficient Time Parallel Solvers with Applications to Multiscale Modeling and Gyrokinetics January 2015 Carl D Lederman AFTC/PA clearance No. 15008, 16 January 2014 1 The Differential Equation

More information

Supporting Growth in Society and Industry Using Statistical Data from Mobile Terminal Networks Overview of Mobile Spatial Statistics

Supporting Growth in Society and Industry Using Statistical Data from Mobile Terminal Networks Overview of Mobile Spatial Statistics Supporting Growth in Society and Industry Using Statistical Data from Mobile Terminal Networks Overview of Mobile Spatial Statistics MSS Estimation Privacy Protection Mobile Spatial Statistics Supporting

More information

NIS Directive development The Incident Notification Framework

NIS Directive development The Incident Notification Framework NIS Directive development The Incident Notification Framework Dan Tofan #certcon 30.10.2017 Bucharest European Union Agency for Network and Information Security Topics 01 NISD Short Intro 02 The incident

More information

Reliability Considerations in Cyber-Power Dependent Systems

Reliability Considerations in Cyber-Power Dependent Systems Reliability Considerations in Cyber-Power Dependent Systems Visvakumar Aravinthan Wichita State University (visvakumar.aravinthan@wichita.edu) PSERC Webinar April 17, 2018 1 Acknowledgement This work was

More information

Before the National Telecommunications and Information Administration Department of Commerce Washington, DC ) ) ) ) )

Before the National Telecommunications and Information Administration Department of Commerce Washington, DC ) ) ) ) ) Before the National Telecommunications and Information Administration Department of Commerce Washington, DC 20230 In the Matter of Developing a Sustainable Spectrum Strategy for America s Future Attn:

More information

Homeland Security and Geographic Information Systems

Homeland Security and Geographic Information Systems Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,

More information

A Thorough Introduction to 64-Bit Aggregates

A Thorough Introduction to 64-Bit Aggregates Technical Report A Thorough Introduction to 64-Bit Aggregates Shree Reddy, NetApp September 2011 TR-3786 CREATING AND MANAGING LARGER-SIZED AGGREGATES The NetApp Data ONTAP 8.0 operating system operating

More information

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Available online at   ScienceDirect. Procedia Computer Science 34 (2014 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 680 685 International Workshop on Software Defined Networks for a New Generation of Applications and Services

More information

Remote Access Server Advertisement (RASADV) Protocol

Remote Access Server Advertisement (RASADV) Protocol [MS-RASA]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Meltem Özturan

Meltem Özturan Meltem Özturan www.mis.boun.edu.tr/ozturan/samd 1 2 Modeling System Requirements Object Oriented Approach to Requirements OOA considers an IS as a set of objects that work together to carry out the function.

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Comprehensive Networking Solutions

Comprehensive Networking Solutions Comprehensive Networking Solutions End to End Networking Solutions in the Water and Wastewater Sectors Standards Certification Education & Training Publishing Conferences & Exhibits Aug 5-7, 2014 Orlando,

More information

Formal Definition of Computation. Formal Definition of Computation p.1/28

Formal Definition of Computation. Formal Definition of Computation p.1/28 Formal Definition of Computation Formal Definition of Computation p.1/28 Computation model The model of computation considered so far is the work performed by a finite automaton Formal Definition of Computation

More information

The UPPAAL Model Checker. Julián Proenza Systems, Robotics and Vision Group. UIB. SPAIN

The UPPAAL Model Checker. Julián Proenza Systems, Robotics and Vision Group. UIB. SPAIN The UPPAAL Model Checker Julián Proenza Systems, Robotics and Vision Group. UIB. SPAIN The aim of this presentation Introduce the basic concepts of model checking from a practical perspective Describe

More information

Representing the Real World

Representing the Real World Representing the Real World The theory of representing the real world in a GIS using digital data The nature of digital data and binary notation The discrete object view of the world Entities, data objects,

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information